D-Link DXS-3600 Series Betriebsanweisung Seite 61

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 100
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 60
59
Model 
IEEE LAN Standard 
Port Interface
 
 4
 2
XFP Module 
CX4 Module 
Stackability Physical Stack


General
Features
Switch Capacity 
Forwarding Rate 
Forwarding Mode Store and Forward
Buffer Memory 
MTBF 
Console Port Female RS-232 DB-9 Console for Out-of-Band Configuration
WLAN Management Capability 
Roaming


Access Control and Bandwidth Management 
Managed Access Point 
AP Management




WLAN Security




Authentication
L2 Features



Full Duplex, Back Pressure in Half Duplex, Head-of-Line Blocking Prevention
Virtual LAN (VLAN)


L3 Features


Quality of Service (QoS)


Dest/Source IP Address
Access Control List (ACL) 
LAN Security




Management Methods




Physical and
Environment
Dimension 
Weight 
Power Input 
Max. Power
Consumption

PoE 
RPS 
Temperature 
Humidity 
Certification
EMI-EMC 
Safety 
Business Wireless
Unied Wired/Wireless Access System
Seitenansicht 60
1 2 ... 56 57 58 59 60 61 62 63 64 65 66 ... 99 100

Kommentare zu diesen Handbüchern

Keine Kommentare